Heinemann, Peter G wrote:
> That's part of our puzzle.  Happy to send more output if it would be helpful.

Yes, I wanted to see the entire output with debuglevel set to -1, for the 
connection
establishment and TLS handshake. That includes the hex packet dumps of the 
network
traffic.

The fact that it connects fine even with an expired cert implies a bug in the 
MozNSS
cert validation functions.
> 
>   ldapsearch connects fine:
> 
> connect success
> TLS: certdb config: configDir='/etc/openldap/certs' 
> tokenDescription='ldap(0)' certPrefix='' keyPrefix='' flags=readOnly
> TLS: using moznss security dir /etc/openldap/certs prefix .
> TLS: certificate [CN=directory.upenn.edu,OU=ISC: N&T - NES - Identity and 
> Access Management (IAM),O=University of Pennsylvania,STREET=3451 Walnut
> Street,L=Philadelphia,ST=PA,postalCode=19104,C=US] is valid
> TLS certificate verification: subject: CN=directory.upenn.edu,OU=ISC: N&T - 
> NES - Identity and Access Management (IAM),O=University of 
> Pennsylvania,STREET=3451
> Walnut Street,L=Philadelphia,ST=PA,postalCode=19104,C=US, issuer: CN=InCommon 
> RSA Server CA,OU=InCommon,O=Internet2,L=Ann Arbor,ST=MI,C=US, cipher: AES-256,
> security level: high, secret key bits: 256, total key bits: 256, cache hits: 
> 0, cache misses: 0, cache not reusable: 0
> ldap_open_defconn: successful
> 
> even when there's an expired cert in the chain:
> 
>  head pd-ldap1.certs  (from this command:
> openssl s_client -host pd-ldap1.net.isc.upenn.edu -port 636 -showcerts 
> 2>pd-ldap1.certs >> pd-ldap1.certs)
> 
> depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = 
> AddTrust External CA Root
> verify error:num=10:certificate has expired
> notAfter=May 30 10:48:38 2020 GMT
> verify return:0
> DONE
> CTED(00000003)
> ---
> Certificate chain
>  0 s:/C=US/postalCode=19104/ST=PA/L=Philadelphia/street=3451 Walnut 
> Street/O=University of Pennsylvania/OU=ISC: N&T - NES - Identity and Access 
> Management
> (IAM)/CN=directory.upenn.edu
>    i:/C=US/ST=MI/L=Ann Arbor/O=Internet2/OU=InCommon/CN=InCommon RSA Server CA
> [0 phei@pi-haproxy2 ~]$ head -20 pd-ldap1.certs
> depth=3 C = SE, O = AddTrust AB, OU = AddTrust External TTP Network, CN = 
> AddTrust External CA Root
> verify error:num=10:certificate has expired
> notAfter=May 30 10:48:38 2020 GMT
> verify return:0
> DONE
> CTED(00000003)
> ----------------------------------------------------------------------------------------------------------------------------------------------------------------
> *From:* Howard Chu <h...@symas.com>
> *Sent:* Wednesday, June 3, 2020 9:43 AM
> *To:* Heinemann, Peter G <p...@isc.upenn.edu>; 
> openldap-technical@openldap.org <openldap-technical@openldap.org>
> *Subject:* Re: ssl certificate chain
>  
> p...@isc.upenn.edu wrote:
>> Not sure if this is an openldap issue but have to examine everything we can.
>> 
>> We revised our nss certificate store as part of addressing the expiration of 
>> our root cert.
>> 
>> It now has two certs, the end service cert and the intermediate.
>> Basic client operations (ldapsearch) work fine;  using -d1 shows that the 
>> appropriate  service certificate is loaded and the the search is successful.
> 
> What is the output from ldapsearch -d -1 ?
> 
> -- 
>   -- Howard Chu
>   CTO, Symas Corp.           http://www.symas.com
>   Director, Highland Sun     http://highlandsun.com/hyc/
>   Chief Architect, OpenLDAP  http://www.openldap.org/project/


-- 
  -- Howard Chu
  CTO, Symas Corp.           http://www.symas.com
  Director, Highland Sun     http://highlandsun.com/hyc/
  Chief Architect, OpenLDAP  http://www.openldap.org/project/

Reply via email to